Call For Papers
Contact Us

  A Review on Metamorphic Cryptography for Video Files  
  Authors : Dhananjay M. Dumbere; Nitin J. Janwe
  Cite as: ijcsn.org/IJCSN-2013/2-6/IJCSN-2013-2-6-150.pdf


Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Steganography is the science of embedding information into the cover image viz., text, video, and image without causing statistically significant modification to the cover image. Combining these two techniques either way together result to new technique-Metamorphic Cryptography [14]. The data (text, audio, video, images) is transformed into cipher data using a key, concealed into another cover object (audio, video, images) using Steganography converting it into a Stegno object, and is finally sent to the receiver. Or the data (text, audio, video, images) is concealed into Cover Object resulting into Stegno Object, (Steganography)and further converting Stegno Object into Cipher Stegno Object (audio, video, images) using Cryptography, and is finally sent to the receiver. This proposed both the technique thus achieves double layer security to data.


Published In : IJCSN Journal Volume 2, Issue 6

Date of Publication : 01 December 2013

Pages : 129 - 136

Figures : 14

Tables : --

Publication Link : ijcsn.org/IJCSN-2013/2-6/IJCSN-2013-2-6-150.pdf




Dhananjay M. Dumbere : graduated from Rajiv Gandhi college of Engineering Research and Technology in 2004. Pursuing M.Tech degree in Computer Science and Engineering from same department, with six years of Academic experience, presently working in Rajiv Gandhi College of engineering Research and Technology as an Assistant Professor in the department of Information Technology. My area of interest includes Cryptography and Network Security, Software Engineering.

Nitin J.Janwe : graduated from Shri Guru Gobind Singhji Institute of Engineering and Technology, Nandeed.Completed M.Tech CSE from G.H Raisoni College of engineering, Nagpur. Pursuing PhD form Nagpur University, with nineteen years of Academic experience currently he is Associated Professor at Rajiv Gandhi college of Engineering Research and Technology, guided many UG & PG students. His research areas include Image and Video Processing, Operating System, Computer Vision.








Metamorphic Cryptography

Cover object

Stegno object

Cipher Stegno Object




Combining Cryptography and Steganography is interesting field and growing rapidly for information hiding in the area of information security.lt has a vital role in defence as well as civil applications. Cryptography can be used along with Steganography to make a highly secure data high in the interest of the military. However, Steganography has its place in security. Though it cannot replace cryptography totally, it is intended to supplement it. Video files have not been combined with Cryptography and Steganogarphy yet; hence we are focus on Video files using Metamorphic Cryptography so that to provide full proof Security for the videos that can be transmitted over the network securely.










[1] Dhawal Seth, L. Ramanathan,”SecurityEnhancement: Combining Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 9– No.11, November 2010.

[2] Shouchao Song, Jie Zhangb,Xin Liao,Jiao Du Qiaoyan Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, 2011 Published by Elsevier Ltd. Selection and/or peer- under responsibility of [CEIS 2011] In Advanced in Control Engineering and Information Science.

[3] T. Sharp.” An implementation of key-based digital signal steganography”. Proc. 4th. Information Hiding Workshop, LNCS, vol. 2137, Berlin: Springer-Verlag, 2001, pp. 13–26.

[4] W.C. Thomas, S. Pantelimon. “Cryptographic Boolean functions and applications”, Elsevier: Academic Press, first edition 2009, pp.119-156.

[5] S.S. Song, J. Zhang, J. Du, Q.Y . Wen.”On the construction of Boolean functions with optimal algebraic immunity and good other properties by concatenation”, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on, Volume1, pp: 417 – 422.

[6] C. Carlet, K. Q. Feng.”New balanced Boolean functions satisfying all the main cryptographic criteria ” [EB/OL]. http://eprint.iacr.org/2008/244.pdf.

[7] Khalil Challita and Hikmat Farhat ,”Combining Steganography and Cryptography: New Directions”, International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1): 199-208,The Society of Digital Information and Wireless Communications, 2011 (ISSN 2220-9085).

[8] S.S. Divya, M. Ram Mohan Reddy, “ Hiding Text in Audio Using Multiple LSB Steganography And Provide Security Using Cryptography” International journal Of Scientific & Technology Reseaech Volume 1,Issue 6,July 2012, ISSN 2277-8616 68 IJSTR©2012 www.ijstr.org.

[9] Mr . Vikas Tyagi, Mr. Atul kumar, Roshan Patel, Sachin Tyagi, Saurabh Singh Gangwar,” Image Steganogarphy Using Least Significant Bit with Cryptography”,Journal of Global Research in Computer Science, Reaearch paper Available Online at www.jgrcs.info © JGRCS 2010, Volume 3, No. 3, March 2012.

[10] Gajendra Singh Chandel, Ravindra Gupta, Swati Jain,” Proposed Model of Dynamic Encryption using Steganography”, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012) .

[11] Abikoye Oluwakemi C,Adewole Kayode S,Oladipupo Ayotunde J.” Efficient Data Hiding System using Cryptography and Steganography” International Journal of Applied Information Systems (IJAIS) – ISSN: 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 4– No.11, December 2012 – www.ijais.org.

[12] Yohan Suryanto,Nur Hayati,Hendra,Kusumawardhana, Dr. Riri Fitri Sari,” Dual Key triple Encryption Text Based Message Suing Cryptography & Steganography” Int.J.Computer Technology & Applications,Vol 4 (1), 43-50 IJCTA | Jan-Feb 2013 Available online@www.ijcta.com 43 ISSN:2229-6093.

[13] Dr.R.Sridevi,Vijaya, Paruchuri,,K.S.SadaShiva Rao, “Image Steganography combined with Cryptography “,Council for Innovative Research Peer Review Research Publishing System Journal: IJCT Vol 9, No 1 , ISSN 22773061 976 | P a g e J u l y 1 5 , 2 0 1 3 editor@cirworld.com,www.cirworld.com, member.cirworld.com.

[14] Thomas Leontin Philjon. , Venkateshvara Rao. “Metamorphic Cryptography - A Paradox between Cryptography and Steganography Using Dynamic Encryption”,IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011 978- 1-4577-0590-8/11/$26.00 ©2011 IEEE MIT, Anna University, Chennai. June 3-5, 2011.

[15] K. Gopalan, “Audio steganography using bit modification”, Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Vol. 2, pp. 421-424, April 2009.

[16] C. C. Chang, T. S. Chen and H. S. Hsia, “An Effective Image Stenographic Scheme Based on Wavelet Transform and Pattern- Based Modification”, IEEE Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing, 2003.